General

  • Target

    c9ab4e8f39998b593f918cb2bc5e4359bda8e82c77f1c9991beaeb2dc86d223f

  • Size

    289KB

  • MD5

    92d88799ebb58e7de96d2f73c5e67940

  • SHA1

    d6b32ee7ba245ab7e3cc5cea131dc9b4878c88f0

  • SHA256

    c9ab4e8f39998b593f918cb2bc5e4359bda8e82c77f1c9991beaeb2dc86d223f

  • SHA512

    a9f705167e79da583311723d67f822dd5306014d82465a2b9c3d0cb6c8745cbc4f551ed493ed418b6129bb49695ee3f359c24d3d0c45790794ed7d12fce06269

  • SSDEEP

    3072:mxjMQVacnG3icUkYdT45/NEGI/Lc+EINkzT1diLUEuBfYcORbnJl3/P0:mxjlVJnQiGP/evc2gT1WcCnJl3/M

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • c9ab4e8f39998b593f918cb2bc5e4359bda8e82c77f1c9991beaeb2dc86d223f
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections